H. Howie Huang
George Washington University
H-index: 31
North America-United States
Top articles of H. Howie Huang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
JITSPMM: Just-in-Time Instruction Generation for Accelerated Sparse Matrix-Matrix Multiplication | Qiang Fu Thomas B Rolinger H Howie Huang | 2024/3/2 | |
TLPGNN: A Lightweight Two-Level Parallelism Paradigm for Graph Neural Network Computation on Single and Multiple GPUs | ACM Transactions on Parallel Computing | Qiang Fu Yuede Ji Thomas B Rolinger H Howie Huang | 2024 |
Improving Content Recommendation: Knowledge Graph-Based Semantic Contrastive Learning for Diversity and Cold-Start Users | arXiv preprint arXiv:2403.18667 | Yejin Kim Scott Rome Kevin Foley Mayur Nankani Rimon Melamed | 2024/3/27 |
Binary code similarity detection system | 2024/3/19 | ||
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection | arXiv preprint arXiv:2310.00843 | Bibek Bhattarai H Howie Huang | 2023/10/2 |
Decontentioned Stochastic Block Partition | Ahsen J Uppal Thomas B Rolinger H Howie Huang | 2023/9/25 | |
Method and system for detecting lateral movement in enterprise computer networks | 2023/12/26 | ||
PROPANE: Prompt design as an inverse problem | arXiv preprint arXiv:2311.07064 | Rimon Melamed Lucas H McCabe Tanay Wakhare Yejin Kim H Howie Huang | 2023/11/13 |
EdgeTorrent: Real-time Temporal Graph Representations for Intrusion Detection | Isaiah J King Xiaokui Shu Jiyong Jang Kevin Eykholt Taesung Lee | 2023/10/16 | |
Steinerlog: prize collecting the audit logs for threat hunting on enterprise network | Bibek Bhattarai Howie Huang | 2022/5/30 | |
Euler: Detecting network lateral movement via scalable temporal link prediction | Isaiah J King H Howie Huang | 2022 | |
Mnemonic: A Parallel Subgraph Matching System for Streaming Graphs | Bibek Bhattarai Howie Huang | 2022/5/30 | |
Nestedgnn: Detecting malicious network activity with nested graph neural networks | Yuede Ji H Howie Huang | 2022/5/16 | |
Graggle: A Graph-based Approach to Document Clustering | Isaiah J King H Howie Huang | 2022/12/17 | |
Domain name service trust delegation in cloud computing: exploitation, risks, and defense | Craig Laprade H Howie Huang | 2022/4/25 | |
iSpan: Parallel Identification of Strongly Connected Components with Spanning Trees | ACM Transactions on Parallel Computing | Yuede Ji Hang Liu Yang Hu H Howie Huang | 2022/8/18 |
Pikachu: Temporal walk based dynamic graph embedding for network anomaly detection | Ramesh Paudel H Howie Huang | 2022/4/25 | |
Illuminati: Towards explaining graph neural networks for cybersecurity analysis | Haoyu He Yuede Ji H Howie Huang | 2022/6/6 | |
Vestige: Identifying Binary Code Provenance for Vulnerability Detection | Yuede Ji Lei Cui H Howie Huang | 2021/6/10 | |
Towards next-generation cybersecurity with graph AI | ACM SIGOPS Operating Systems Review | Benjamin Bowman H Howie Huang | 2021/6/4 |